Sciweavers

2047 search results - page 116 / 410
» Pervasive Computing on Active Networks
Sort
View
AINA
2010
IEEE
15 years 2 months ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
IWMM
2010
Springer
157views Hardware» more  IWMM 2010»
15 years 3 months ago
Tracing garbage collection on highly parallel platforms
The pervasiveness of multiprocessor and multicore hardware and the rising level of available parallelism are radically changing the computing landscape. Can software deal with tom...
Katherine Barabash, Erez Petrank
EUSAI
2004
Springer
15 years 2 months ago
Confidence Estimation of the State Predictor Method
Pervasive resp. ubiquitous systems use context information to adapt appliance behavior to human needs. Even more convenience is reached if the appliance foresees the user's de...
Jan Petzold, Faruk Bagci, Wolfgang Trumler, Theo U...
EUROSSC
2006
Springer
15 years 2 months ago
Discovery and Composition of Services for Context-Aware Systems
We consider the challenge of dynamically adapting services to context changes that occur in ubiquitous computing environments (e.g., changes in a user's activity) and propose ...
Cristian Hesselman, Andrew Tokmakoff, Pravin Pawar...
HCI
2007
15 years 16 days ago
Inhabitant Guidance of Smart Environments
Abstract. With the convergence of technologies in artificial intelligence, humancomputer interfaces, and pervasive computing, the idea of a “smart environment” is becoming a re...
Parisa Rashidi, G. Michael Youngblood, Diane J. Co...